@@ -59,7 +59,7 @@ func TestAuthorizeCode_PopulateTokenEndpointResponse(t *testing.T) {
5959 },
6060 description : "should fail because authcode not found" ,
6161 setup : func (t * testing.T , areq * fosite.AccessRequest , config * fosite.Config ) {
62- code , _ , err := strategy .GenerateAuthorizeCode (nil , nil )
62+ code , _ , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
6363 require .NoError (t , err )
6464 areq .Form .Set ("code" , code )
6565 },
@@ -79,7 +79,7 @@ func TestAuthorizeCode_PopulateTokenEndpointResponse(t *testing.T) {
7979 },
8080 description : "should fail because validation failed" ,
8181 setup : func (t * testing.T , areq * fosite.AccessRequest , config * fosite.Config ) {
82- require .NoError (t , store .CreateAuthorizeCodeSession (nil , "bar" , areq ))
82+ require .NoError (t , store .CreateAuthorizeCodeSession (context . Background () , "bar" , areq ))
8383 },
8484 expectErr : fosite .ErrInvalidRequest ,
8585 },
@@ -97,11 +97,11 @@ func TestAuthorizeCode_PopulateTokenEndpointResponse(t *testing.T) {
9797 },
9898 },
9999 setup : func (t * testing.T , areq * fosite.AccessRequest , config * fosite.Config ) {
100- code , sig , err := strategy .GenerateAuthorizeCode (nil , nil )
100+ code , sig , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
101101 require .NoError (t , err )
102102 areq .Form .Add ("code" , code )
103103
104- require .NoError (t , store .CreateAuthorizeCodeSession (nil , sig , areq ))
104+ require .NoError (t , store .CreateAuthorizeCodeSession (context . Background () , sig , areq ))
105105 },
106106 description : "should pass with offline scope and refresh token" ,
107107 check : func (t * testing.T , aresp * fosite.AccessResponse ) {
@@ -127,11 +127,11 @@ func TestAuthorizeCode_PopulateTokenEndpointResponse(t *testing.T) {
127127 },
128128 setup : func (t * testing.T , areq * fosite.AccessRequest , config * fosite.Config ) {
129129 config .RefreshTokenScopes = []string {}
130- code , sig , err := strategy .GenerateAuthorizeCode (nil , nil )
130+ code , sig , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
131131 require .NoError (t , err )
132132 areq .Form .Add ("code" , code )
133133
134- require .NoError (t , store .CreateAuthorizeCodeSession (nil , sig , areq ))
134+ require .NoError (t , store .CreateAuthorizeCodeSession (context . Background () , sig , areq ))
135135 },
136136 description : "should pass with refresh token always provided" ,
137137 check : func (t * testing.T , aresp * fosite.AccessResponse ) {
@@ -157,11 +157,11 @@ func TestAuthorizeCode_PopulateTokenEndpointResponse(t *testing.T) {
157157 },
158158 setup : func (t * testing.T , areq * fosite.AccessRequest , config * fosite.Config ) {
159159 config .RefreshTokenScopes = []string {}
160- code , sig , err := strategy .GenerateAuthorizeCode (nil , nil )
160+ code , sig , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
161161 require .NoError (t , err )
162162 areq .Form .Add ("code" , code )
163163
164- require .NoError (t , store .CreateAuthorizeCodeSession (nil , sig , areq ))
164+ require .NoError (t , store .CreateAuthorizeCodeSession (context . Background () , sig , areq ))
165165 },
166166 description : "should pass with no refresh token" ,
167167 check : func (t * testing.T , aresp * fosite.AccessResponse ) {
@@ -186,11 +186,11 @@ func TestAuthorizeCode_PopulateTokenEndpointResponse(t *testing.T) {
186186 },
187187 },
188188 setup : func (t * testing.T , areq * fosite.AccessRequest , config * fosite.Config ) {
189- code , sig , err := strategy .GenerateAuthorizeCode (nil , nil )
189+ code , sig , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
190190 require .NoError (t , err )
191191 areq .Form .Add ("code" , code )
192192
193- require .NoError (t , store .CreateAuthorizeCodeSession (nil , sig , areq ))
193+ require .NoError (t , store .CreateAuthorizeCodeSession (context . Background () , sig , areq ))
194194 },
195195 description : "should not have refresh token" ,
196196 check : func (t * testing.T , aresp * fosite.AccessResponse ) {
@@ -222,7 +222,7 @@ func TestAuthorizeCode_PopulateTokenEndpointResponse(t *testing.T) {
222222 }
223223
224224 aresp := fosite .NewAccessResponse ()
225- err := h .PopulateTokenEndpointResponse (nil , c .areq , aresp )
225+ err := h .PopulateTokenEndpointResponse (context . Background () , c .areq , aresp )
226226
227227 if c .expectErr != nil {
228228 require .EqualError (t , err , c .expectErr .Error (), "%+v" , err )
@@ -294,7 +294,7 @@ func TestAuthorizeCode_HandleTokenEndpointRequest(t *testing.T) {
294294 },
295295 description : "should fail because authcode could not be retrieved (1)" ,
296296 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.AuthorizeRequest ) {
297- token , _ , err := strategy .GenerateAuthorizeCode (nil , nil )
297+ token , _ , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
298298 require .NoError (t , err )
299299 areq .Form = url.Values {"code" : {token }}
300300 },
@@ -330,11 +330,11 @@ func TestAuthorizeCode_HandleTokenEndpointRequest(t *testing.T) {
330330 },
331331 description : "should fail because client mismatch" ,
332332 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.AuthorizeRequest ) {
333- token , signature , err := strategy .GenerateAuthorizeCode (nil , nil )
333+ token , signature , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
334334 require .NoError (t , err )
335335 areq .Form = url.Values {"code" : {token }}
336336
337- require .NoError (t , store .CreateAuthorizeCodeSession (nil , signature , authreq ))
337+ require .NoError (t , store .CreateAuthorizeCodeSession (context . Background () , signature , authreq ))
338338 },
339339 expectErr : fosite .ErrInvalidGrant ,
340340 },
@@ -356,11 +356,11 @@ func TestAuthorizeCode_HandleTokenEndpointRequest(t *testing.T) {
356356 },
357357 description : "should fail because redirect uri was set during /authorize call, but not in /token call" ,
358358 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.AuthorizeRequest ) {
359- token , signature , err := strategy .GenerateAuthorizeCode (nil , nil )
359+ token , signature , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
360360 require .NoError (t , err )
361361 areq .Form = url.Values {"code" : {token }}
362362
363- require .NoError (t , store .CreateAuthorizeCodeSession (nil , signature , authreq ))
363+ require .NoError (t , store .CreateAuthorizeCodeSession (context . Background () , signature , authreq ))
364364 },
365365 expectErr : fosite .ErrInvalidGrant ,
366366 },
@@ -384,11 +384,11 @@ func TestAuthorizeCode_HandleTokenEndpointRequest(t *testing.T) {
384384 },
385385 description : "should pass" ,
386386 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.AuthorizeRequest ) {
387- token , signature , err := strategy .GenerateAuthorizeCode (nil , nil )
387+ token , signature , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
388388 require .NoError (t , err )
389389
390390 areq .Form = url.Values {"code" : {token }}
391- require .NoError (t , store .CreateAuthorizeCodeSession (nil , signature , authreq ))
391+ require .NoError (t , store .CreateAuthorizeCodeSession (context . Background () , signature , authreq ))
392392 },
393393 },
394394 {
@@ -409,12 +409,12 @@ func TestAuthorizeCode_HandleTokenEndpointRequest(t *testing.T) {
409409 assert .Equal (t , time .Now ().Add (time .Minute ).UTC ().Round (time .Second ), areq .GetSession ().GetExpiresAt (fosite .RefreshToken ))
410410 },
411411 setup : func (t * testing.T , areq * fosite.AccessRequest , authreq * fosite.AuthorizeRequest ) {
412- code , sig , err := strategy .GenerateAuthorizeCode (nil , nil )
412+ code , sig , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
413413 require .NoError (t , err )
414414 areq .Form .Add ("code" , code )
415415
416- require .NoError (t , store .CreateAuthorizeCodeSession (nil , sig , areq ))
417- require .NoError (t , store .InvalidateAuthorizeCodeSession (nil , sig ))
416+ require .NoError (t , store .CreateAuthorizeCodeSession (context . Background () , sig , areq ))
417+ require .NoError (t , store .InvalidateAuthorizeCodeSession (context . Background () , sig ))
418418 },
419419 description : "should fail because code has been used already" ,
420420 expectErr : fosite .ErrInvalidGrant ,
@@ -457,7 +457,7 @@ func TestAuthorizeCodeTransactional_HandleTokenEndpointRequest(t *testing.T) {
457457 RequestedAt : time .Now ().UTC (),
458458 },
459459 }
460- token , _ , err := strategy .GenerateAuthorizeCode (nil , nil )
460+ token , _ , err := strategy .GenerateAuthorizeCode (context . Background () , nil )
461461 require .NoError (t , err )
462462 request .Form = url.Values {"code" : {token }}
463463 response := fosite .NewAccessResponse ()
0 commit comments